General

  • Target

    01a1484a30212f8511f04ed162f54d04e921598154bde03e3c594caa41d70342.exe

  • Size

    772KB

  • Sample

    221114-2r2veaad5z

  • MD5

    53a0423e947832839264d0587b5b713f

  • SHA1

    9ed896985d20e83e309e8e7a2dac075840328b1a

  • SHA256

    01a1484a30212f8511f04ed162f54d04e921598154bde03e3c594caa41d70342

  • SHA512

    504db5eacd1b1f02e0adccc3a091ee22454a476fb01227d6afb7bfb124091ee759034ca521983c1d5c83fa5dda92bc2a796435bb71bc18291d006d0148b1abd4

  • SSDEEP

    12288:elDRU68atsFb35lj/KtgtmMoMkZaFS1yVmW13nevA8jHV2KaVfpdw1:yU68atsxz4gtmMSvW13neIi12KaVo1

Malware Config

Extracted

Family

eternity

C2

http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion

Extracted

Family

redline

Botnet

doc

C2

81.161.229.143:26910

Attributes
  • auth_value

    e067ff186bbd1a16b906849c2001d852

Targets

    • Target

      01a1484a30212f8511f04ed162f54d04e921598154bde03e3c594caa41d70342.exe

    • Size

      772KB

    • MD5

      53a0423e947832839264d0587b5b713f

    • SHA1

      9ed896985d20e83e309e8e7a2dac075840328b1a

    • SHA256

      01a1484a30212f8511f04ed162f54d04e921598154bde03e3c594caa41d70342

    • SHA512

      504db5eacd1b1f02e0adccc3a091ee22454a476fb01227d6afb7bfb124091ee759034ca521983c1d5c83fa5dda92bc2a796435bb71bc18291d006d0148b1abd4

    • SSDEEP

      12288:elDRU68atsFb35lj/KtgtmMoMkZaFS1yVmW13nevA8jHV2KaVfpdw1:yU68atsxz4gtmMSvW13neIi12KaVo1

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks